Analysis of Ethical Hacking in Cybersecurity Practices
VerifiedAdded on 2025/05/12
|8
|1900
|326
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Table of Contents
Assessment 3a.......................................................................................................................................2
1st Affirmative....................................................................................................................................2
2nd Affirmative....................................................................................................................................2
3rd Affirmative....................................................................................................................................2
4th Affirmative....................................................................................................................................3
5th Affirmative....................................................................................................................................3
Assessment 3b:......................................................................................................................................4
Introduction.......................................................................................................................................4
Strength:............................................................................................................................................5
Weakness..........................................................................................................................................6
Conclusion.........................................................................................................................................7
References:............................................................................................................................................8
Assessment 3a.......................................................................................................................................2
1st Affirmative....................................................................................................................................2
2nd Affirmative....................................................................................................................................2
3rd Affirmative....................................................................................................................................2
4th Affirmative....................................................................................................................................3
5th Affirmative....................................................................................................................................3
Assessment 3b:......................................................................................................................................4
Introduction.......................................................................................................................................4
Strength:............................................................................................................................................5
Weakness..........................................................................................................................................6
Conclusion.........................................................................................................................................7
References:............................................................................................................................................8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Assessment 3a
1st Affirmative
Companies in the market have different kind of risks regarding their management and
databases but the most important risk is the compromised data of users or clients that the
company has. The IT department of these companies might work to keep the data secure by
hook or by crook from the hackers. But there is a difference in between the professionals and
experts. IT department has professionals that learned function to protect the data but expert
hackers are altogether a different thing, they don’t work, they use their skills for their own
learning and satisfaction and hence hacks sites as a challenge. Therefore, employing expert
hackers and using their skills for the protection can be much useful for the companies rather
than employing professional data protectors (Crawley 2016).
2nd Affirmative
Expert hackers always keep learning by hacking different websites, blogs, applications, and
databases of various companies so that they can enhance their capabilities regarding coding
and can also get an amount of money for their living. Since everybody needs money for
living the companies can hire some expert hackers that might agree to work for the
companies on a good package. This will be beneficial for the company and as well as for the
hackers as the money they will get will be legitimate.
IT professionals can do things that they have learned at their institutes like they can use
several functions to protect data, build firewall, apply encryptions and but Hackers do not
work like that. They focus on goals instead of using functions in a project. Hackers can
provide the company with their best knowledge which they have learned. They use the
technique of ‘Pen Testing’ or ‘Penetration Testing’ this techniques is also called ethical
hacking in which a hacker assess a computer system or the network of the company or any
web application to find out if there are any security or IT vulnerabilities that some
unauthorized access can penetrate and jump into the system, network and steal the
confidential data of the company.
3rd Affirmative
Expert hackers can be hence beneficial for the company as they can find out the weaknesses
and drawbacks of the IT structure, network structure of the company. This is a very easy and
common activity for the hackers because this is the goal of their hacking. They always keep
on learning that how one can hack the parameter of any secure network. Hence, they can find
out the weak point of any secured network, search out the databases and website of the
company, operating system drawbacks, server drawbacks and many other possibilities that
can exploit the company network and create a gateway for the malware to enter into the
system (Mansfield-Devine, S 2017).
After concluding out the possibilities that can hamper the system security and consequences
of those possibilities, they can coordinate and provide results to the IT chief and company
heads to improve those weak points or to work on them so that the infrastructure can be safe
1st Affirmative
Companies in the market have different kind of risks regarding their management and
databases but the most important risk is the compromised data of users or clients that the
company has. The IT department of these companies might work to keep the data secure by
hook or by crook from the hackers. But there is a difference in between the professionals and
experts. IT department has professionals that learned function to protect the data but expert
hackers are altogether a different thing, they don’t work, they use their skills for their own
learning and satisfaction and hence hacks sites as a challenge. Therefore, employing expert
hackers and using their skills for the protection can be much useful for the companies rather
than employing professional data protectors (Crawley 2016).
2nd Affirmative
Expert hackers always keep learning by hacking different websites, blogs, applications, and
databases of various companies so that they can enhance their capabilities regarding coding
and can also get an amount of money for their living. Since everybody needs money for
living the companies can hire some expert hackers that might agree to work for the
companies on a good package. This will be beneficial for the company and as well as for the
hackers as the money they will get will be legitimate.
IT professionals can do things that they have learned at their institutes like they can use
several functions to protect data, build firewall, apply encryptions and but Hackers do not
work like that. They focus on goals instead of using functions in a project. Hackers can
provide the company with their best knowledge which they have learned. They use the
technique of ‘Pen Testing’ or ‘Penetration Testing’ this techniques is also called ethical
hacking in which a hacker assess a computer system or the network of the company or any
web application to find out if there are any security or IT vulnerabilities that some
unauthorized access can penetrate and jump into the system, network and steal the
confidential data of the company.
3rd Affirmative
Expert hackers can be hence beneficial for the company as they can find out the weaknesses
and drawbacks of the IT structure, network structure of the company. This is a very easy and
common activity for the hackers because this is the goal of their hacking. They always keep
on learning that how one can hack the parameter of any secure network. Hence, they can find
out the weak point of any secured network, search out the databases and website of the
company, operating system drawbacks, server drawbacks and many other possibilities that
can exploit the company network and create a gateway for the malware to enter into the
system (Mansfield-Devine, S 2017).
After concluding out the possibilities that can hamper the system security and consequences
of those possibilities, they can coordinate and provide results to the IT chief and company
heads to improve those weak points or to work on them so that the infrastructure can be safe

from the malicious software, unauthorized accesses and malware. These all the threats that
can penetrate the security parameters of a company are all generated by the ethical hackers
and only a hacker can get to know the way which another hacker can use to enter into the
security premises of the company and steal or damage the confidential information of the
data.
4th Affirmative
Even the large and global companies like Facebook, Google, Microsoft and Amazon also
conducts a program in which they temporarily hire ethical hackers to test their system on
various parameters continually. Hiring these hackers leads help them to find out the points
that aren’t much secure and that can be used to penetrate the boundaries of the network
system of the company. These programs are called ‘bug bounty’ programmes where various
hackers work to find out the weak points of these large company infrastructures and in return,
the company provide them with an amount of money for their efforts. In 2017, two major
symposiums were organised for the hacking community over the entire world which was
Black Hat and DEF CON where such discussion of hiring hackers for company network
penetration was processed. This discussion resulted that the unknown fears can be more
devastating than the known ones and malware, and data breach is one of them (AB Article
2018).
Most of the hackers keep and knows the techniques that are used to penetrate any security
parameter of any company by implementing some efforts. These techniques that they have
learnt can’t be identified by any common IT software engineer. Using these techniques,
hackers can consult with the companies and provide them with the loopholes and vulnerable
points through which some other hackers can break into the network.
5th Affirmative
With all these above specifications the main hidden advantage of employing hacker is this
that only they can be helpful while consulting the weak points, loopholes and sensitive areas
of the company and find out the issues. This consultation will mainly aim in providing the
technology that can be used to prevent the issues and can tell the company how some
improvements can be made into the system or network of the company. Although, software
engineers can work to improve those sensitive areas but they are the one that have created
that unsecure network and an outsider or hacker have find out the loopholes in that network.
Therefore it is even better to consult with the hacker about improvements and
recommendations for their company that can be made to get a secure network for the
company (Votipka 2018).
can penetrate the security parameters of a company are all generated by the ethical hackers
and only a hacker can get to know the way which another hacker can use to enter into the
security premises of the company and steal or damage the confidential information of the
data.
4th Affirmative
Even the large and global companies like Facebook, Google, Microsoft and Amazon also
conducts a program in which they temporarily hire ethical hackers to test their system on
various parameters continually. Hiring these hackers leads help them to find out the points
that aren’t much secure and that can be used to penetrate the boundaries of the network
system of the company. These programs are called ‘bug bounty’ programmes where various
hackers work to find out the weak points of these large company infrastructures and in return,
the company provide them with an amount of money for their efforts. In 2017, two major
symposiums were organised for the hacking community over the entire world which was
Black Hat and DEF CON where such discussion of hiring hackers for company network
penetration was processed. This discussion resulted that the unknown fears can be more
devastating than the known ones and malware, and data breach is one of them (AB Article
2018).
Most of the hackers keep and knows the techniques that are used to penetrate any security
parameter of any company by implementing some efforts. These techniques that they have
learnt can’t be identified by any common IT software engineer. Using these techniques,
hackers can consult with the companies and provide them with the loopholes and vulnerable
points through which some other hackers can break into the network.
5th Affirmative
With all these above specifications the main hidden advantage of employing hacker is this
that only they can be helpful while consulting the weak points, loopholes and sensitive areas
of the company and find out the issues. This consultation will mainly aim in providing the
technology that can be used to prevent the issues and can tell the company how some
improvements can be made into the system or network of the company. Although, software
engineers can work to improve those sensitive areas but they are the one that have created
that unsecure network and an outsider or hacker have find out the loopholes in that network.
Therefore it is even better to consult with the hacker about improvements and
recommendations for their company that can be made to get a secure network for the
company (Votipka 2018).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Assessment 3b:
Introduction
Security is the major concern for spreading the awareness to surroundings. Cybersecurity is
the issue to prevent information, activities through hackers or viruses. Generally, hackers
generate support for conferences and information societies. Hackers are considered as
members of society (Buczak, 2015).
Introduction
Security is the major concern for spreading the awareness to surroundings. Cybersecurity is
the issue to prevent information, activities through hackers or viruses. Generally, hackers
generate support for conferences and information societies. Hackers are considered as
members of society (Buczak, 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Strength:
Hackers play a key role in societies. They provide the lost information to protect the data by
resetting the password again. There are so many conditions in which the user forget his
password for the specific application at that time hackers provide the information of the
password and save the data. They also provide the testing for penetration the information
which provides the strength to the system and also generates the security. For protect the
security breaches by using some specific measures for the prevention. They need the system
for which prevents them also from the malicious activity (Monteith 2016).
Sometimes, hackers do some types of amazing things. Hackers found their own organizations
and move on to the programs based on the stars or it can be said that the programs that use
high technology. For example, Mark Zuckerberg founder of Facebook is also a hacker who
used his programming skills in order to provide ventures for society. hackers are also known
by term vocal critics because the updating of any application only provided by the hackers.
Each time in this condition, only hackers provide a way to overcome security or buggy
problems (Samtani 2017).
Hackers are also considered as the best coders for the systems because hackers are the
innovator of the applications and the programs. Most of the visualize open source are
generate and tested by the hackers only who provide the solutions for the software
companies. They do the takeaway task in many instances which includes the hackers can
transform them in an increasing manner. Three types of hackers provide the benefits for the
technology based on the applications and security. Black hat hackers are considered as the
menace for society. in other hands, white and gray hat hackers provide the benefits for the
company.
Hackers play a key role in societies. They provide the lost information to protect the data by
resetting the password again. There are so many conditions in which the user forget his
password for the specific application at that time hackers provide the information of the
password and save the data. They also provide the testing for penetration the information
which provides the strength to the system and also generates the security. For protect the
security breaches by using some specific measures for the prevention. They need the system
for which prevents them also from the malicious activity (Monteith 2016).
Sometimes, hackers do some types of amazing things. Hackers found their own organizations
and move on to the programs based on the stars or it can be said that the programs that use
high technology. For example, Mark Zuckerberg founder of Facebook is also a hacker who
used his programming skills in order to provide ventures for society. hackers are also known
by term vocal critics because the updating of any application only provided by the hackers.
Each time in this condition, only hackers provide a way to overcome security or buggy
problems (Samtani 2017).
Hackers are also considered as the best coders for the systems because hackers are the
innovator of the applications and the programs. Most of the visualize open source are
generate and tested by the hackers only who provide the solutions for the software
companies. They do the takeaway task in many instances which includes the hackers can
transform them in an increasing manner. Three types of hackers provide the benefits for the
technology based on the applications and security. Black hat hackers are considered as the
menace for society. in other hands, white and gray hat hackers provide the benefits for the
company.

Weakness
Hacking is dangerous if it done with the negative mindset and then affects down all the
programming and systems of the applications. Hackers have some sorts of negativities like
privacy security is getting reduced down by implement changing in the privacy policies.
While moving on different webs, most of the data and information are leak out. There is too
much loss of the money during the hacking because several organizations pay the high rates
for a hack out the data of the other organizations. Human reputation and information both are
lost while having the hacking. These are the major weakness of hacking and ethical hacking.
It also creates massive aspects in order to secure the breaches. Hacking provides the services
and malicious attacks on the companies as well as the applications of the system (Khera
2017).
Due to hacking, the violation of privacy factors is also an important task. It hampers down all
the operations of the system by changing all the functions of a system and unauthorized the
private information which is going to be accessed for the system or the organization.
Hacking is dangerous if it done with the negative mindset and then affects down all the
programming and systems of the applications. Hackers have some sorts of negativities like
privacy security is getting reduced down by implement changing in the privacy policies.
While moving on different webs, most of the data and information are leak out. There is too
much loss of the money during the hacking because several organizations pay the high rates
for a hack out the data of the other organizations. Human reputation and information both are
lost while having the hacking. These are the major weakness of hacking and ethical hacking.
It also creates massive aspects in order to secure the breaches. Hacking provides the services
and malicious attacks on the companies as well as the applications of the system (Khera
2017).
Due to hacking, the violation of privacy factors is also an important task. It hampers down all
the operations of the system by changing all the functions of a system and unauthorized the
private information which is going to be accessed for the system or the organization.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Conclusion
In this, the actions for defending and attacking are too much similar in hacking conditions. As
hackers placed a positive impact on society by providing too many facilities to save
information on the systems. But sometimes, it affects the programming by leak out the data
or information by taking the money from other organization and reduce down the reputation
of the other companies.
In this, the actions for defending and attacking are too much similar in hacking conditions. As
hackers placed a positive impact on society by providing too many facilities to save
information on the systems. But sometimes, it affects the programming by leak out the data
or information by taking the money from other organization and reduce down the reputation
of the other companies.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

References:
AB Article 2018, Why companies should use hackers to protect their IT systems, ACCA
Global, viewed 20 June 2019,
<https://www.accaglobal.com/lk/en/member/member/accounting-business/2018/01/insights/
pentest-jan.html>
Buczak, AL & Guven, E 2015, ‘A survey of data mining and machine learning methods for
cybersecurity intrusion detection’, IEEE Communications Surveys & Tutorials, vol. 18, no. 2,
pp. 1153-1176.
Crawley, A 2016, ‘Hiring hackers’, Network Security, vol. 2016, no. 9, pp.13-15.
Denis, M, Zena, C & Hayajneh, T 2016, ‘April. Penetration testing: Concepts, attack
methods, and defense strategies’, In 2016 IEEE Long Island Systems, Applications and
Technology Conference (LISAT), pp. 1-6. IEEE.
Khera, M 2017, ‘Think like a hacker: Insights on the latest attack vectors (and security
controls) for medical device applications’, Journal of diabetes science and technology, vol.
11, no. 2, pp.207-212.
Mansfield-Devine, S 2017, ‘Hiring ethical hackers: the search for the right kinds of
skills’, Computer Fraud & Security, vol. 2017, no. 2, pp.15-20.
Manworren, N, Letwat, J & Daily, O 2016, ‘Why you should care about the Target data
breach’, Business Horizons, vol. 59, no. 3, pp.257-266.
Monteith, B 2016, ‘Hacking for good and bad, and how to protect yourself against
hacks!’, Knowledge Quest, vol. 44, no. 4, pp. 60.
Omer, T 2016, ‘Empowered citizen ‘health hackers’ who are not waiting’, BMC
Medicine, vol. 14, no. 1, pp. 118.
Ryan, JF, Groot, VP, Rosati, LM, Hacker-Prietz, A, Narang, AK, McNutt, TR, Jackson, JF,
Le, DT, Jaffee, EM, Zheng, L & Laheru, DA 2018, ‘Stereotactic body radiation therapy for
isolated local recurrence after surgical resection of pancreatic ductal adenocarcinoma appears
to be safe and effective’, Annals of surgical oncology, vol. 25, no. 1, pp.280-289.
Samtani, S, Chinn, R, Chen, H & Nunamaker Jr, JF 2017, ‘Exploring emerging hacker assets
and key hackers for proactive cyber threat intelligence’ Journal of Management Information
Systems, vol. 34, no. 4, pp. 1023-1053.
Votipka, D, Stevens, R, Redmiles, E, Hu, J & Mazurek, M 2018, ‘May. Hackers vs. testers: A
comparison of software vulnerability discovery processes’, In 2018 IEEE Symposium on
Security and Privacy (SP), pp. 374-39. IEEE.
AB Article 2018, Why companies should use hackers to protect their IT systems, ACCA
Global, viewed 20 June 2019,
<https://www.accaglobal.com/lk/en/member/member/accounting-business/2018/01/insights/
pentest-jan.html>
Buczak, AL & Guven, E 2015, ‘A survey of data mining and machine learning methods for
cybersecurity intrusion detection’, IEEE Communications Surveys & Tutorials, vol. 18, no. 2,
pp. 1153-1176.
Crawley, A 2016, ‘Hiring hackers’, Network Security, vol. 2016, no. 9, pp.13-15.
Denis, M, Zena, C & Hayajneh, T 2016, ‘April. Penetration testing: Concepts, attack
methods, and defense strategies’, In 2016 IEEE Long Island Systems, Applications and
Technology Conference (LISAT), pp. 1-6. IEEE.
Khera, M 2017, ‘Think like a hacker: Insights on the latest attack vectors (and security
controls) for medical device applications’, Journal of diabetes science and technology, vol.
11, no. 2, pp.207-212.
Mansfield-Devine, S 2017, ‘Hiring ethical hackers: the search for the right kinds of
skills’, Computer Fraud & Security, vol. 2017, no. 2, pp.15-20.
Manworren, N, Letwat, J & Daily, O 2016, ‘Why you should care about the Target data
breach’, Business Horizons, vol. 59, no. 3, pp.257-266.
Monteith, B 2016, ‘Hacking for good and bad, and how to protect yourself against
hacks!’, Knowledge Quest, vol. 44, no. 4, pp. 60.
Omer, T 2016, ‘Empowered citizen ‘health hackers’ who are not waiting’, BMC
Medicine, vol. 14, no. 1, pp. 118.
Ryan, JF, Groot, VP, Rosati, LM, Hacker-Prietz, A, Narang, AK, McNutt, TR, Jackson, JF,
Le, DT, Jaffee, EM, Zheng, L & Laheru, DA 2018, ‘Stereotactic body radiation therapy for
isolated local recurrence after surgical resection of pancreatic ductal adenocarcinoma appears
to be safe and effective’, Annals of surgical oncology, vol. 25, no. 1, pp.280-289.
Samtani, S, Chinn, R, Chen, H & Nunamaker Jr, JF 2017, ‘Exploring emerging hacker assets
and key hackers for proactive cyber threat intelligence’ Journal of Management Information
Systems, vol. 34, no. 4, pp. 1023-1053.
Votipka, D, Stevens, R, Redmiles, E, Hu, J & Mazurek, M 2018, ‘May. Hackers vs. testers: A
comparison of software vulnerability discovery processes’, In 2018 IEEE Symposium on
Security and Privacy (SP), pp. 374-39. IEEE.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.